93 results on '"Fu-Chen Zhu"'
Search Results
2. An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption.
- Author
-
Fei Gao 0001, Su-Juan Qin, Qiao-Yan Wen, and Fu-Chen Zhu
- Published
- 2005
- Full Text
- View/download PDF
3. Security of quantum secret sharing with two-particle entanglement against individual attacks.
- Author
-
Su-Juan Qin, Fei Gao 0001, Qiao-Yan Wen, and Fu-Chen Zhu
- Published
- 2009
- Full Text
- View/download PDF
4. A simple participant attack on the brádler-dušek protocol.
- Author
-
Fei Gao 0001, Su-Juan Qin, Qiao-Yan Wen, and Fu-Chen Zhu
- Published
- 2007
- Full Text
- View/download PDF
5. MULTIPARTY CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH PHASE ENCRYPTION
- Author
-
Fu-Chen Zhu, Tian-Yin Wang, and Qiao-Yan Wen
- Subjects
TheoryofComputation_MISCELLANEOUS ,Scheme (programming language) ,Quantum network ,Physics and Astronomy (miscellaneous) ,business.industry ,Computer science ,Permission ,Encryption ,Quantum cryptography ,Encoding (memory) ,Communication source ,business ,Protocol (object-oriented programming) ,computer ,Computer network ,computer.programming_language - Abstract
We present a new multiparty controlled quantum secure direct communication protocol with phase encryption, in which the sender's secret message can only be recovered by the receiver under the permission of all the controllers. The security of this scheme is based on the basic principles of quantum mechanics and the secret order of encoding photons.
- Published
- 2011
- Full Text
- View/download PDF
6. Three-particle QKD protocol against a collective noise
- Author
-
Wei Huang, Zheng Huang, Qiao-Yan Wen, Fen-Zhuo Guo, and Fu-Chen Zhu
- Subjects
Quantum network ,Bell state ,Quantum decoherence ,Decoherence-free subspaces ,business.industry ,Computer science ,Quantum Physics ,Quantum key distribution ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Noise ,Optics ,Quantum mechanics ,Quantum system ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,business ,Quantum information science ,Algorithm ,Subspace topology ,Computer Science::Cryptography and Security - Abstract
The research on decoherence-free subspace has both theoretical and practical significance. DFS is a subspace of quantum system states which is robust against a specific form of decoherence. The method of constructing DFS based algebra, which is different from the way based on the special Bell states, is introduced. Then a three-particle QKD protocol against collective-bit flipping noise is presented according to this method. Finally, we make a security analysis of our protocol.
- Published
- 2011
- Full Text
- View/download PDF
7. PERFECT TELEPORTATION, SUPERDENSE CODING VIA A KIND OF W-CLASS STATE
- Author
-
Fu-Chen Zhu, Li-Ying Shang-Guan, Xiu-Bo Chen, Qiao-Yan Wen, Hong-Xiang Sun, and Heng-Yue Jia
- Subjects
Physics ,Class (set theory) ,Physics and Astronomy (miscellaneous) ,Superdense coding ,Quantum mechanics ,Qubit ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Data_CODINGANDINFORMATIONTHEORY ,Communication source ,State (functional analysis) ,Teleportation - Abstract
Perfect teleportation and superdense coding are discussed via a special kind of W-state. It is shown that the state can be used for perfect teleportation of the state x|0〉⊗N + y|1〉⊗N. And the state can be utilized for superdense coding. Moreover, it is demonstrated that the sender can transmit N classical bits to the receiver by sending N − 1 qubits.
- Published
- 2010
- Full Text
- View/download PDF
8. QUANTUM KEY DISTRIBUTION BY CONSTRUCTING NONORTHOGONAL STATES WITH BELL STATES
- Author
-
Qiao-Yan Wen, Fu-Chen Zhu, Fen-Zhuo Guo, and Fei Gao
- Subjects
Bell state ,Quantum cryptography ,Computer science ,Feature (machine learning) ,Key (cryptography) ,Word error rate ,Statistical and Nonlinear Physics ,Communication source ,Quantum key distribution ,Condensed Matter Physics ,Algorithm ,Protocol (object-oriented programming) - Abstract
A quantum key distribution (QKD) protocol based on constructed nonorthogonal states is proposed. By transmitting the photons from Bell states in random order the sender constructs nonorthogonal states, which can prevent an eavesdropper from extracting the key information. At the destination, the receiver performs Bell measurements and then obtains secure key. Different from previous nonorthogonal-states-based QKD protocols, our protocol exhibits a new feature, that is, the users can also obtain some key bits even when they choose different "bases"! Thus it can reach a higher efficiency in theory. Besides, we present a trade-off between the information that an eavesdropper can elicit and the corresponding error rate he/she would introduce, which shows that our protocol is secure.
- Published
- 2010
- Full Text
- View/download PDF
9. A TWO-STEP CHANNEL-ENCRYPTING QUANTUM KEY DISTRIBUTION PROTOCOL
- Author
-
Fen-Zhuo Guo, Fu-Chen Zhu, Fei Gao, and Qiao-Yan Wen
- Subjects
Quantum network ,SARG04 ,Physics and Astronomy (miscellaneous) ,Quantum cryptography ,Computer science ,Quantum channel ,Quantum information ,Quantum key distribution ,Topology ,BB84 ,Quantum teleportation ,Computer Science::Cryptography and Security - Abstract
A two-step channel-encrypting quantum key distribution protocol is proposed. Using the previously shared EPR pairs as the quantum key, two bits of classical key can be established via one information carrier EPR state on average. In theory, the efficiency of this protocol reaches 100%, and there is no need to consume any entangled states including both the quantum key and the information carriers in ideal condition. The protocol can resist the particular attack that is fatal to other some channel-encrypting schemes. Principally, we prove the security against the most general individual attack of this protocol. Entanglement collapse in practical situation, as well as the realistic implementation of this protocol is also discussed.
- Published
- 2010
- Full Text
- View/download PDF
10. Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state
- Author
-
Su-Juan Qin, Fu-Chen Zhu, Fei Gao, and Qiao-Yan Wen
- Subjects
business.industry ,Computer science ,Permission ,Cryptographic protocol ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,law.invention ,Optics ,Greenberger–Horne–Zeilinger state ,Quantum cryptography ,law ,Quantum mechanics ,State (computer science) ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,business ,Quantum information science ,Cryptanalysis ,Quantum ,Computer network - Abstract
We analyze the security of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger (GHZ) state. It is shown that the receiver, using a special property of GHZ state, can illegally obtain 33.3% of the sender’s secret without any controller’s permission. The attack strategy is demonstrated in detail and an improvement of this protocol is discussed. The idea of this attack might be instructive for the cryptanalysis of quantum cryptographic protocols.
- Published
- 2010
- Full Text
- View/download PDF
11. Necessary and sufficient conditions on n-qudit state for perfect teleportation of an arbitrary single qudit state
- Author
-
Hong-Xiang Sun, Li-Ying Shang-Guan, Fu-Chen Zhu, and Qiao-Yan Wen
- Subjects
Computer science ,business.industry ,Data_CODINGANDINFORMATIONTHEORY ,Quantum Physics ,Quantum channel ,One-way quantum computer ,Topology ,Teleportation ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Computer Science::Emerging Technologies ,Optics ,Superdense coding ,Quantum state ,Quantum mechanics ,Qubit ,No-teleportation theorem ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,Quantum information ,business ,Quantum information science ,Quantum teleportation ,Computer Science::Information Theory - Abstract
Firstly, we investigate the necessary and sufficient conditions that an entangled channel of n -qubits should satisfy to carry out perfect teleportation of an arbitrary single qubit state and dense coding. It is shown that the sender can transmit two classical bits of information by sending one qubit. Further, the case of high-dimension quantum state is also considered. Utilizing n -qudit state as quantum channel, it is proposed that the necessary and sufficient conditions are ( d + 2 ) ( d - 1 ) 2 in all to teleport an arbitrary single qudit state. The sender can transmit 2 log 2 d classical bits of information to the receiver conditioned on the constraints.
- Published
- 2009
- Full Text
- View/download PDF
12. Multiparty quantum secret sharing with collective eavesdropping-check
- Author
-
Qiao-Yan Wen, Fu-Chen Zhu, Su-Juan Qin, and Song Lin
- Subjects
Bell state ,business.industry ,Computer science ,Eavesdropping ,Quantum Physics ,Unitary state ,Secret sharing ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,symbols.namesake ,Optics ,symbols ,EPR paradox ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,Quantum information ,business ,Telecommunications ,Protocol (object-oriented programming) ,Quantum ,Computer Science::Cryptography and Security ,Computer network - Abstract
A scalable protocol for multiparty quantum secret splitting with collective eavesdropping-check is proposed by using Einstein–Podolsky–Rosen pairs. We analyze the security of this protocol and prove that it can stand against some possible attacks in an ideal condition. Meanwhile, this protocol utilizes quantum dense coding to achieve a high intrinsic efficiency and source capacity. Moreover, only Bell-state measurement and local unitary operations are required, which makes this protocol more convenient from an applied point of view.
- Published
- 2009
- Full Text
- View/download PDF
13. Multiparty quantum secret sharing based on Bell measurement
- Author
-
Fei Gao, Xiu-Bo Chen, Qiao-Yan Wen, Fu-Chen Zhu, and Ying Sun
- Subjects
Scheme (programming language) ,Homomorphic secret sharing ,Theoretical computer science ,Proactive secret sharing ,business.industry ,Computer science ,Quantum entanglement ,Secret sharing ,Unitary state ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Optics ,Quantum cryptography ,Quantum mechanics ,Verifiable secret sharing ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,business ,Quantum information science ,computer ,Computer Science::Cryptography and Security ,computer.programming_language - Abstract
A multiparty quantum secret sharing scheme based on Bell measurement is proposed and analyzed. In this scheme, all agents are not required to prepare entangled states or perform any local unitary operation. The security of the protocol is also analyzed. It is shown that any eavesdropper will introduce errors invariably and be detected if he tries to steal information about Trent’s secret. Moreover, because no classical bit needs to be transmitted except those for detection, the total efficiency of the scheme approaches to 100%.
- Published
- 2009
- Full Text
- View/download PDF
14. Secure authentication of classical messages with decoherence-free states
- Author
-
Tian-Yin Wang, Fu-Chen Zhu, and Qiao-Yan Wen
- Subjects
Authentication ,Length extension attack ,Computer science ,business.industry ,Hash function ,Email authentication ,Hash-based message authentication code ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Optics ,Generic Bootstrapping Architecture ,Authentication protocol ,Computer Science::Multimedia ,Lightweight Extensible Authentication Protocol ,Message authentication code ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,Challenge–response authentication ,business ,Data Authentication Algorithm ,Computer Science::Cryptography and Security ,Computer network - Abstract
We present an efficient scheme for secure authentication of classical messages with decoherence-free states and hash functions. We also analyze the security of this scheme and show it is not possible to forge valid message authentication codes. In addition, the lengths of the authentication key and message authentication codes are invariant no mater how long the length of the message to be authenticated is. Moreover, although this scheme uses entangled states for encoding, only single-particle product measurements are required.
- Published
- 2009
- Full Text
- View/download PDF
15. Quantum secure direct communication over the collective amplitude damping channel
- Author
-
Su-Juan Qin, Fu-Chen Zhu, Luo-Ming Meng, and Qiao-Yan Wen
- Subjects
Physics ,Quantum network ,Data_CODINGANDINFORMATIONTHEORY ,Quantum capacity ,Quantum channel ,Topology ,Classical capacity ,Quantum error correction ,Quantum mechanics ,Quantum algorithm ,Quantum information ,Amplitude damping channel ,Computer Science::Cryptography and Security ,Computer Science::Information Theory - Abstract
An efficient quantum secure direct communication protocol is presented over the amplitude damping channel. The protocol encodes logical bits in two-qubit noiseless states, and so it can function over a quantum channel subjected to collective amplitude damping. The feature of this protocol is that the sender encodes the secret directly on the quantum states, the receiver decodes the secret by performing determinate measurements, and there is no basis mismatch. The transmission’s safety is ensured by the nonorthogonality of the noiseless states traveling forward and backward on the quantum channel. Moreover, we construct the efficient quantum circuits to implement channel encoding and information encoding by means of primitive operations in quantum computation.
- Published
- 2009
- Full Text
- View/download PDF
16. An efficient and secure multiparty quantum secret sharing scheme based on single photons
- Author
-
Fen-Zhuo Guo, Fu-Chen Zhu, Xiu-Bo Chen, Tian-Yin Wang, and Qiao-Yan Wen
- Subjects
Homomorphic secret sharing ,Photon ,Proactive secret sharing ,business.industry ,Computer science ,Eavesdropping ,Unitary state ,Secret sharing ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Optics ,Quantum cryptography ,Quantum mechanics ,Verifiable secret sharing ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,Quantum information science ,business ,Quantum teleportation ,Computer Science::Cryptography and Security ,Computer network - Abstract
A scheme of multiparty quantum secret sharing of classical messages (QSSCM) is proposed based on single photons and local unitary operations. In this scheme, eavesdropping checks are performed only twice, and one photon can generate one bit of classical secret message except those chosen for eavesdropping check; in addition, only the sender and one of the agents are required to store photons. Thus, this scheme is more practical and efficient.
- Published
- 2008
- Full Text
- View/download PDF
17. Quantum secret sharing between multiparty and multiparty with entanglement swapping
- Author
-
Su-Juan Qin, Song Lin, Fu-chen Zhu, Qiao-Yan Wen, and Fei Gao
- Subjects
TheoryofComputation_MISCELLANEOUS ,Quantum secret sharing ,Theoretical computer science ,Computer Networks and Communications ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,TheoryofComputation_GENERAL ,Eavesdropping ,Quantum entanglement ,Signal Processing ,Quantum Fourier transform ,State (computer science) ,Protocol (object-oriented programming) ,Information Systems ,Mathematics - Abstract
A quantum secret sharing (QSS) protocol between multiparty and multiparty is proposed, based on Greenberger–Horne– Zeilinger (GHZ) state. The protocol utilizes quantum Fourier transform and entanglement swapping to achieve a high intrinsic efficiency and source capacity. Then, the security of this protocol against some possible eavesdropping strategies has been analyzed. Furthermore, the presented protocol is generalized to the d-level case.
- Published
- 2008
- Full Text
- View/download PDF
18. Cryptanalysis and improvement of multiparty quantum secret sharing schemes
- Author
-
Qiao-Yan Wen, Fei Gao, Fu-Chen Zhu, Tian-Yin Wang, and Song Lin
- Subjects
Discrete mathematics ,Physics ,Bell state ,Homomorphic secret sharing ,General Physics and Astronomy ,law.invention ,Quantum cryptography ,law ,Quantum mechanics ,Secure multi-party computation ,Verifiable secret sharing ,Quantum information ,Cryptanalysis ,Quantum teleportation - Abstract
A scheme of multiparty quantum secret sharing of classical messages (QSSCM) [Z.J. Zhang et al., Opt. Commun. 269 (2007) 418] was proposed. Lin et al. [S. Lin et al., Opt. Commun. 281 (2008) 4553] showed the last agent can obtain half of the secret in Z.J. Zhang's et al. three-party QSSCM scheme and gave an improved version. We further show the first agent and the last agent can obtain all the secret without introducing any error in Zhang's et al. multiparty QSSCM scheme by a special attack with quantum teleportation. We also present an improved version.
- Published
- 2008
- Full Text
- View/download PDF
19. Comparing the efficiencies of different detect strategies in the ping-pong protocol
- Author
-
Fen-Zhuo Guo, Fu-Chen Zhu, Qiao-Yan Wen, and Fei Gao
- Subjects
Quantum cryptography ,Computer science ,Ping pong ,Comparison results ,Quantum key distribution ,Information gain ,Protocol (object-oriented programming) ,Quantum secure direct communication ,Simulation - Abstract
The way to compare the efficiencies of different detect strategies (DSs) in the “ping-pong” protocol is studied. The trade-off between information gain and disturbance is calculated and compared for different DSs. The comparison result primely tallies with our intuitional analysis. It is shown that the analysis of this trade-off is a feasible way to compare the performances of different DSs in theory.
- Published
- 2008
- Full Text
- View/download PDF
20. CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH W STATE
- Author
-
Xiu-Bo Chen, Fen-Zhuo Guo, Ying Sun, Fu-Chen Zhu, Gang Xu, and Qiao-Yan Wen
- Subjects
Physics ,Quantum network ,Physics and Astronomy (miscellaneous) ,Quantum cryptography ,Quantum error correction ,Quantum capacity ,One-way quantum computer ,Quantum key distribution ,Quantum information ,W state ,Topology - Abstract
Utilizing W state, which is much more robust than GHZ state, we propose a protocol for three-party controlled quantum secure direct communication (QSDC). The feature of this protocol is that the sender encodes the secret message directly on a sequence of particle states and faithfully transmits them to an arbitrary one of two receivers without revealing any information to a potential eavesdropper. On the other hand, we construct the efficient quantum circuit to implement the QSDC by means of primitive operations in quantum computation.
- Published
- 2008
- Full Text
- View/download PDF
21. CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM ENCRYPTION
- Author
-
Jian-Zhong Du, Tian-Yin Wang, Fu-Chen Zhu, Xiu-Bo Chen, and Qiao-Yan Wen
- Subjects
Physics ,Quantum network ,Physics and Astronomy (miscellaneous) ,business.industry ,TheoryofComputation_GENERAL ,Eavesdropping ,Quantum entanglement ,Quantum key distribution ,Encryption ,Greenberger–Horne–Zeilinger state ,Quantum cryptography ,business ,Quantum ,Computer network - Abstract
Utilizing a partially entangled GHZ state, we propose a novel controlled quantum secure direct communication (QSDC) with quantum encryption. Under the supervision and help of the third side, the sender and the receiver can securely share the private quantum entanglement keys used to encrypt and decrypt the secret message. According to the results of checking the eavesdropping on decoy photons, communicators can decide whether the quantum keys are reused in the next round. Not only will eavesdropping inevitably disturb the states of the decoy photons and be detected, but arbitrary transmission errors can also be corrected.
- Published
- 2008
- Full Text
- View/download PDF
22. Comment on: 'Three-party quantum secure direct communication based on GHZ states' [Phys. Lett. A 354 (2006) 67]
- Author
-
Fu-Chen Zhu, Fei Gao, Su-Juan Qin, and Qiao-Yan Wen
- Subjects
Protocol (science) ,Physics ,Greenberger–Horne–Zeilinger state ,Quantum cryptography ,law ,Quantum mechanics ,General Physics and Astronomy ,Three party ,Cryptanalysis ,Quantum information science ,Quantum secure direct communication ,law.invention - Abstract
The GHZ-state-based quantum secure direct communication (QSDC) protocol [X.-R. Jin, et al., Phys. Lett. A 354 (2006) 67] and its improved version [Z. Man, Y. Xia, Chin. Phys. Lett. 24 (2007) 15] are analyzed from the aspect of security. It shows that much information of the transmitted secret message will be leaked out in both protocols.
- Published
- 2008
- Full Text
- View/download PDF
23. Quantum circuits for controlled teleportation of two-particle entanglement via a W state
- Author
-
Xiu-Bo Chen, Qiao-Yan Wen, Song Lin, Ning Zhang, and Fu-Chen Zhu
- Subjects
Physics ,Quantum network ,Quantum Physics ,Quantum entanglement ,Quantum channel ,Quantum energy teleportation ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Computer Science::Emerging Technologies ,Superdense coding ,Quantum mechanics ,Quantum operation ,No-teleportation theorem ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,Quantum teleportation - Abstract
A protocol for three-party controlled quantum teleportation is discussed. It is shown that an unknown two-particle entanglement can be teleported to any one of two receivers via the only one three-particle W state. We summarize all different unitary transformations performed by the receiver with a concise formula. The quantum circuits for the generalized measurement described by positive operator-valued measure (POVM), which is utilized to probabilistically distinguish the two non-orthogonal states, are explicitly constructed by means of quantum Toffoli gates. The efficient quantum circuits for implementing the teleportation are also provided.
- Published
- 2008
- Full Text
- View/download PDF
24. Teleportation of an unknown two-particle entangled state via an asymmetric three-particle entanglement state
- Author
-
Jian-zhong Du, Xiu-Bo Chen, Qiao-Yan Wen, and Fu-Chen Zhu
- Subjects
Computer Networks and Communications ,Computer science ,TheoryofComputation_GENERAL ,Data_CODINGANDINFORMATIONTHEORY ,Quantum Physics ,Quantum channel ,One-way quantum computer ,Quantum energy teleportation ,Topology ,Teleportation ,Greenberger–Horne–Zeilinger state ,Superdense coding ,Signal Processing ,Computer Science::Networking and Internet Architecture ,W state ,Quantum teleportation ,Computer Science::Information Theory ,Computer Science::Cryptography and Security ,Information Systems - Abstract
In this article, a protocol for the teleportation of an unknown two-particle entanglement is proposed. The feature of the present protocol is that we utilize an asymmetric three-particle entangled state as the quantum channel. The optimal discrimination between two nonorthogonal quantum states is adopted. It is shown that an unknown two-particle entangled state can be probabilistically teleported from the sender to the remote receiver on condition that the co-sender successfully collaborates. The fidelity in this protocol is one. In addition, the probability of the successful teleportation is calculated and all kinds of transformations performed by the sender and the receiver are provided in detail.
- Published
- 2008
- Full Text
- View/download PDF
25. An external attack on the Brádler–Dušek protocol
- Author
-
Su-Juan Qin, Qiao-Yan Wen, and Fu-Chen Zhu
- Subjects
Physics ,Quantum secret sharing ,Protocol (science) ,Attack strategy ,Proactive secret sharing ,Condensed Matter Physics ,Computer security ,computer.software_genre ,Alice (programming language) ,computer ,Atomic and Molecular Physics, and Optics ,computer.programming_language - Abstract
The two quantum secret sharing protocols in the paper of Bradler and Dusek (2004 J. Opt. B: Quantum Semiclass. Opt. 6 63) are analysed and it is shown that both protocols are insecure not only for a dishonest participant but also for an external eavesdropper. An external eavesdropper Eve can steal half of Alice's secret without being detected, if she employs a special attack strategy. We give a possible way to improve the protocol to withstand this attack.
- Published
- 2007
- Full Text
- View/download PDF
26. QUANTUM CIRCUITS FOR PROBABILISTIC ENTANGLEMENT TELEPORTATION VIA A PARTIALLY ENTANGLED PAIR
- Author
-
Xiu-Bo Chen, Qiao-Yan Wen, and Fu-Chen Zhu
- Subjects
Physics ,Quantum network ,Bell state ,Physics and Astronomy (miscellaneous) ,TheoryofComputation_GENERAL ,Data_CODINGANDINFORMATIONTHEORY ,Quantum Physics ,Quantum channel ,One-way quantum computer ,Quantum energy teleportation ,Topology ,Quantum nonlocality ,Computer Science::Emerging Technologies ,Superdense coding ,Quantum mechanics ,Quantum teleportation - Abstract
It deserves mentioning that the quantum circuit, i.e. quantum logic network, is essential to the practical realization of teleportation in experiment. Using only one partially entangled pair, we first propose two novel strategies for probabilistically teleporting any partially entangled state of a bipartite system. The feature of the present protocol is to weaken the requirement for the quantum channel, and also to cut down the number of entangled particles initially shared by the sender and receiver. On the other hand, we explicitly construct the generalized measurement described by the positive operator-valued measure (POVM). Two kinds of efficient quantum circuits for implementing the teleportation are offered. In addition, we generalize the two-particle probabilistic teleportation to the system of many particles.
- Published
- 2007
- Full Text
- View/download PDF
27. A simple participant attack on the Bradler-Dusek protocol
- Author
-
Su-Juan Qin, Fei Gao, Fu-Chen Zhu, and Qiao-Yan Wen
- Subjects
Quantum secret sharing ,Nuclear and High Energy Physics ,Homomorphic secret sharing ,SIMPLE (military communications protocol) ,Computer science ,General Physics and Astronomy ,Statistical and Nonlinear Physics ,Computer security ,computer.software_genre ,Secret sharing ,Theoretical Computer Science ,law.invention ,Computational Theory and Mathematics ,Quantum cryptography ,law ,Alice (programming language) ,Cryptanalysis ,computer ,Protocol (object-oriented programming) ,Mathematical Physics ,computer.programming_language - Abstract
The ring-arrangement quantum secret sharing protocol in the paper [K. Br\'{a}dler and M. Du\v{s}ek (2004) {\textit{J. Opt. B: Quantum Semiclass. Opt.}} {\textbf{6}} 63] is analyzed and it is shown that this protocol is secure for any eavesdropper except for a dishonest participant. For example, by a special strategy, Bob can steal Charlie's portion of information without being detected and then recover Alice's secret by himself. We give a description of this strategy and point out a possible way to improve the protocol to stand against this attack.
- Published
- 2007
- Full Text
- View/download PDF
28. Probabilistic teleportation of a two-particle entangled state via a partially entangled pair
- Author
-
Xin-yuan Liu, Xiu-Bo Chen, Qiao-Yan Wen, and Fu-Chen Zhu
- Subjects
Computer Networks and Communications ,Quantum Physics ,One-way quantum computer ,Quantum channel ,Teleportation ,POVM ,Greenberger–Horne–Zeilinger state ,Quantum mechanics ,Signal Processing ,Calculus ,W state ,Quantum teleportation ,Information Systems ,Peres–Horodecki criterion ,Mathematics - Abstract
A scheme for teleporting an unknown two-particle entangled state is proposed. In comparison with the recent protocol (Cola et al., Phys. Lett. A 337 (2005)), the entangled state as quantum channel required by this scheme is a single, partially entangled pair, which is much easier to prepare and maintain. Furthermore, a positive operator valued measure (POVM) is adopted and all kinds of transformations performed by sender and receiver are given in detail. It is shown that the probability of successful teleportation is twice the modulus square of the smaller Schmidt coefficient of the two-particle entangled state, and the fidelity can reach one.
- Published
- 2006
- Full Text
- View/download PDF
29. QUANTUM KEY DISTRIBUTION BASED ON ENTANGLEMENT SWAPPING BETWEEN TWO BELL STATES
- Author
-
Tailin Liu, Fu-Chen Zhu, Fenzhuo Guo, and Qiao-Yan Wen
- Subjects
Quantum network ,Bell state ,Physics and Astronomy (miscellaneous) ,Quantum cryptography ,Computer science ,Quantum mechanics ,Quantum entanglement ,Quantum key distribution ,Topology ,Squashed entanglement ,Quantum teleportation ,No-communication theorem - Abstract
Based on entanglement swapping between two Bell states, two novel quantum key distribution protocols are proposed. One is for two-level systems, where there is no need for classical communication before each entanglement swapping. This feature is essential to its practical realization. Furthermore, to establish an arbitrarily long key, the protocol needs only two Bell states. The other is for d-level (d > 2) systems, in which higher security and higher source capacity are achieved. Using the theory of quadratic residue, we prove that in the two-qudit systems, each Bell state is a uniform superposition of all basis states in the dual basis, which is different to the situation in two-qubit systems. This difference means our two-level protocol cannot be generalized to the d-level situation directly. On the other hand, it results in higher security of our d-level protocol and is instructive to design quantum cryptography protocols.
- Published
- 2006
- Full Text
- View/download PDF
30. On the information-splitting essence of two types of quantum key distribution protocols
- Author
-
Qiao-Yan Wen, Fen-Zhuo Guo, Fu-Chen Zhu, and Fei Gao
- Subjects
Physics ,Quantum Physics ,Quantum network ,Theoretical computer science ,FOS: Physical sciences ,General Physics and Astronomy ,Quantum channel ,Quantum capacity ,Quantum key distribution ,Quantum cryptography ,Quantum mechanics ,Quantum process ,Quantum information ,Quantum Physics (quant-ph) ,BB84 - Abstract
With the help of a simple quantum key distribution (QKD) scheme, we discuss the relation between BB84-type protocols and two-step-type ones. It is shown that they have the same essence, i.e., information-splitting. More specifically, the similarity between them includes (1) the carrier state is split into two parts which will be sent one by one; (2) the possible states of each quantum part are indistinguishable; (3) anyone who obtains both parts can recover the initial carrier state and then distinguish it from several possible states. This result is useful for related scheme designing and security analyzing., Comment: 4 pages, 1 figure, Revtex 4
- Published
- 2006
- Full Text
- View/download PDF
31. Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurements
- Author
-
Qiao-Yan Wen, Fu-Chen Zhu, and Tian-Yin Wang
- Subjects
TheoryofComputation_MISCELLANEOUS ,Quantum secret sharing ,Bell state ,Homomorphic secret sharing ,Proactive secret sharing ,business.industry ,Computer science ,Computer security ,computer.software_genre ,Secret sharing ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,law.invention ,Optics ,law ,Secure multi-party computation ,Verifiable secret sharing ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,business ,Cryptanalysis ,Protocol (object-oriented programming) ,computer - Abstract
The security of multiparty quantum secret sharing with Bell states and Bell measurements [R.H. Shi et al., Opt. Commun. 283 (2010) 2476] is analyzed. It is shown that the first agent and the last one can gain access to the dealer's secret if they collaborate in this protocol. Therefore, this protocol does not satisfy the security requirement of quantum secret sharing.
- Published
- 2011
- Full Text
- View/download PDF
32. Improving the quantum secure direct communication by entangled qutrits and entanglement swapping against intercept-and-resend attack
- Author
-
Su-Juan Qin, Fei Gao, Qiao-Yan Wen, and Fu-Chen Zhu
- Subjects
Physics ,business.industry ,Quantum entanglement ,Quantum capacity ,Quantum key distribution ,Squashed entanglement ,Topology ,Multipartite entanglement ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Optics ,Quantum cryptography ,Quantum mechanics ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,W state ,business ,Quantum teleportation - Abstract
The security of quantum secure direct communication by entangled qutrits and entanglement swapping [Y.B. Zhan et al., Opt. Commun. 282 (2009) 4633] is analyzed. It is shown that an eavesdropper can obtain all the secret without being found by a simple intercept-and-resend attack. Finally, a possible improvement to resist this attack is proposed.
- Published
- 2010
- Full Text
- View/download PDF
33. Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack
- Author
-
Fu-Chen Zhu, Ying Sun, and Qiao-Yan Wen
- Subjects
Homomorphic secret sharing ,Quantum decoherence ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Eavesdropping ,Computer security ,computer.software_genre ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Optics ,Quantum cryptography ,Noise (video) ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,business ,Quantum information science ,computer ,Protocol (object-oriented programming) - Abstract
The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one.
- Published
- 2010
- Full Text
- View/download PDF
34. Cryptanalysis and improvement of a secure quantum sealed-bid auction
- Author
-
Su-Juan Qin, Fei Gao, Qiao-Yan Wen, Fu-Chen Zhu, and Luo-Ming Meng
- Subjects
SIMPLE (military communications protocol) ,Computer science ,business.industry ,TheoryofComputation_GENERAL ,Computer security ,computer.software_genre ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,law.invention ,Greenberger–Horne–Zeilinger state ,Optics ,Quantum cryptography ,law ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,Quantum information ,Cryptanalysis ,Telecommunications ,business ,computer ,Quantum ,Protocol (object-oriented programming) - Abstract
The security of a secure quantum sealed-bid auction protocol using quantum secure direct communication [Mosayeb Naseri, Opt. Commun. 282 (2009) 1939] is analyzed. It is shown that this protocol is unfair as a malicious bidder can obtain others’ bids without being found, and then he can optimize his bid to win the auction. Finally, a simple improvement to resist this attack is proposed.
- Published
- 2009
- Full Text
- View/download PDF
35. Cryptanalysis and improvement of a DSQC using four-particle entangled state and entanglement swapping
- Author
-
Qiao-Yan Wen, Song Lin, Fen-Zhuo Guo, Fu-Chen Zhu, and Su-Juan Qin
- Subjects
business.industry ,Computer science ,Quantum entanglement ,Topology ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,law.invention ,Optics ,Quantum cryptography ,law ,Quantum mechanics ,State (computer science) ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,Quantum information ,W state ,business ,Cryptanalysis ,Quantum information science - Abstract
The security of a deterministic secure quantum communication using four-particle genuine entangled state and entanglement swapping [X.M. Xiu, H.K. Dong, L. Dong, Y.J. Cao, F. Chi, Opt. Commun. 282 (2009) 2457] is analyzed. It is shown that an eavesdropper can entangle an ancilla without introducing any error in the security test utilizing a speciality of the four-particle genuine entangled state. Moreover, the eavesdropper can distill a quarter of the secret information from her entangled ancilla. Finally, a simple improvement to resist this attack is proposed.
- Published
- 2009
- Full Text
- View/download PDF
36. Comment on 'Controlled DSQC using five-qubit entangled states and two-step security test'
- Author
-
Fu-Chen Zhu, Qiao-Yan Wen, Luo-Ming Meng, and Su-Juan Qin
- Subjects
Theoretical computer science ,business.industry ,Quantum pseudo-telepathy ,Computer science ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,law.invention ,Optics ,Quantum cryptography ,Alice and Bob ,law ,Qubit ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,Quantum information ,Telecommunications ,business ,Cryptanalysis ,Quantum information science ,Realization (systems) - Abstract
A controlled deterministic secure quantum communication protocol [X.M. Xiu, L. Dong, Y.J. Cao, F. Chi, Opt. Commun. 282 (2009) 333] with five-qubit entangled states was proposed recently. The aim of Xiu et al. was that the successful realization of communication between Alice and Bob needed the cooperation of a controller, Charlie. However, we show that the controller Charlie’s role could be excluded unknowingly. Moreover, an eavesdropper can entangle an ancilla without introducing any error in the first security test and then she can distill a quarter of the secret messages from her entangled ancilla.
- Published
- 2009
- Full Text
- View/download PDF
37. Improving the security of secure quantum telephone against an attack with fake particles and local operations
- Author
-
Qiao-Yan Wen, Ying Sun, Fei Gao, and Fu-Chen Zhu
- Subjects
SIMPLE (military communications protocol) ,business.industry ,Computer science ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Optics ,Quantum cryptography ,Information leakage ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,business ,Telecommunications ,Quantum information science ,Protocol (object-oriented programming) ,Quantum ,Computer network - Abstract
The security of the secure quantum telephone protocol [X.J. Wen, Y. Liu, N.R. Zhou, Opt. Commun. 275 (2007) 278] is analyzed. It is shown that an eavesdropper can attack the communicators’ messages by using fake particles and local operations. Moreover, the essential reasons of the information leakage are discussed. Finally, a simple improvement of the secure quantum telephone protocol is proposed.
- Published
- 2009
- Full Text
- View/download PDF
38. A special attack on the multiparty quantum secret sharing of secure direct communication using single photons
- Author
-
Qiao-Yan Wen, Fei Gao, Su-Juan Qin, and Fu-Chen Zhu
- Subjects
Quantum secret sharing ,Photon ,Computer science ,business.industry ,Direct communication ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Optics ,Quantum cryptography ,Electrical and Electronic Engineering ,Physical and Theoretical Chemistry ,business ,Quantum information science ,Quantum secure direct communication ,Protocol (object-oriented programming) ,Computer network - Abstract
The security of a multiparty quantum secret sharing protocol [L.F. Han, Y.M. Liu, J. Liu, Z.J. Zhang, Opt. Commun. 281 (2008) 2690] is reexamined. It is shown that any one dishonest participant can obtain all the transmitted secret bits by a special attack, where the controlled- ( - i σ y ) gate is employed to invalidate the role of the random phase shift operation. Furthermore, a possible way to resist this attack is discussed.
- Published
- 2008
- Full Text
- View/download PDF
39. Comment on: 'Quantum exam' [Phys. Lett. A 350 (2006) 174]
- Author
-
Fu-Chen Zhu, Fei Gao, and Qiao-Yan Wen
- Subjects
Physics ,Protocol (science) ,Quantum cryptography ,Attack strategy ,law ,Quantum mechanics ,General Physics and Astronomy ,Quantum entanglement ,Cryptanalysis ,Quantum information science ,Quantum ,law.invention - Abstract
The security of quantum exam [B.A. Nguyen, Phys. Lett. A 350 (2006) 174] is analyzed and it is found that this protocol is secure for any eavesdropper except for a dishonest “student” who takes part in the exam. The particular attack strategy is demonstrated and a possible improvement of this protocol is presented.
- Published
- 2007
- Full Text
- View/download PDF
40. Improving the security of multiparty quantum secret sharing against an attack with a fake signal
- Author
-
Qiao-Yan Wen, Fu-Chen Zhu, Fei Gao, and Su-Juan Qin
- Subjects
TheoryofComputation_MISCELLANEOUS ,Physics ,Homomorphic secret sharing ,General Physics and Astronomy ,Computer security ,computer.software_genre ,Secret sharing ,Shamir's Secret Sharing ,Quantum cryptography ,Secure multi-party computation ,Verifiable secret sharing ,Quantum information ,computer ,Protocol (object-oriented programming) - Abstract
We come up with a special attack strategy to the multiparty quantum secret sharing protocol [Z.J. Zhang, Y. Li, Z.X. Man, Phys. Rev. A 71 (2005) 044301]. Using fake signal and Bell measurement, the agent Bob who generates the initial signals can elicit Alice's secret message. With little modification, our strategy also works for an improved version of this protocol. At last, a further improvement of the multiparty quantum secret sharing protocol is proposed.
- Published
- 2006
- Full Text
- View/download PDF
41. Probabilistic Teleportation of an Arbitrary d-Level n-Particle (n-Qudit) State
- Author
-
Fu-Chen Zhu, Liying Shangguan, Hongxiang Sun, and Qiaoyan Wen
- Subjects
Physics ,Atmospheric measurements ,Theoretical computer science ,Probabilistic logic ,Probabilistic teleportation ,Particle ,Quantum entanglement ,State (computer science) ,Statistical physics ,Teleportation ,Protocol (object-oriented programming) - Published
- 2009
- Full Text
- View/download PDF
42. Robust variations of the Bennett-Brassard 1984 protocol against collective noise
- Author
-
Fu-Chen Zhu, Ying Sun, Fei Gao, and Qiao-Yan Wen
- Subjects
Physics ,Theoretical computer science ,Quantum cryptography ,Robustness (computer science) ,Universal composability ,Cryptographic protocol ,BB84 ,Atomic and Molecular Physics, and Optics - Abstract
The security of the decoherence-free version of the Bennett-Brassard 1984 (BB84) protocol [A. Cabello, Phys. Rev. A 75, 020301 (2007)] is analyzed and shown to be vulnerable under the intercept-resend attack. We propose two improved versions of this protocol. Both improvements remain the performance of robustness against collective noise and refuse the security flaw. Especially, the second improvement, which is called four-qubit decoherence-free (DF) BB84 protocol, not only remains all characteristics of the original protocol but also has a higher efficiency. We also give a detailed security proof of four-qubit DF BB84 protocol.
- Published
- 2009
- Full Text
- View/download PDF
43. Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks
- Author
-
Fu-Chen Zhu, Qiao-Yan Wen, Song Lin, and Fei Gao
- Subjects
Physics ,Quantum network ,SARG04 ,business.industry ,Quantum key distribution ,Atomic and Molecular Physics, and Optics ,Quantum technology ,Quantum cryptography ,Quantum error correction ,Quantum mechanics ,Quantum information ,business ,Quantum teleportation ,Computer Science::Cryptography and Security ,Computer network - Abstract
A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.
- Published
- 2009
- Full Text
- View/download PDF
44. Comment on 'General relation between the transformation operator and an invariant under stochastic local operations and classical communication in quantum teleportation'
- Author
-
Gang Xu, Fu-Chen Zhu, Yixian Yang, Xiu-Bo Chen, and Qiao-Yan Wen
- Subjects
Physics ,LOCC ,Transformation operator ,Relation (database) ,Invariant (mathematics) ,Quantum information science ,Atomic and Molecular Physics, and Optics ,Quantum teleportation ,Mathematical physics - Published
- 2009
- Full Text
- View/download PDF
45. Quantum secure direct communication withχ-type entangled states
- Author
-
Qiao-Yan Wen, Fu-Chen Zhu, Fei Gao, and Song Lin
- Subjects
Discrete mathematics ,Physics ,Quantum network ,Quantum cryptography ,Superdense coding ,Computer Science::Networking and Internet Architecture ,Ideal (ring theory) ,Type (model theory) ,Protocol (object-oriented programming) ,Quantum ,Atomic and Molecular Physics, and Optics ,Quantum teleportation ,Computer Science::Cryptography and Security - Abstract
In this paper, a quantum secure direct communication protocol with $\ensuremath{\chi}$-type entangled states ${\ensuremath{\mid}{\ensuremath{\chi}}^{00}⟩}_{3214}$ is proposed. We analyze the security of this protocol and prove that it is secure in ideal conditions. Then, an alternative way is presented to ensure the security of this protocol in a noisy channel. Moreover, this protocol utilizes quantum superdense coding to achieve a high intrinsic efficiency and source capacity. The practical implementation of this protocol is also discussed.
- Published
- 2008
- Full Text
- View/download PDF
46. Comment on 'Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection'
- Author
-
Fu-Chen Zhu, Fei Gao, Fen-Zhuo Guo, and Qiao-Yan Wen
- Subjects
Protocol (science) ,Physics ,Quantum error correction ,Quantum mechanics ,General Physics and Astronomy ,Quantum information science ,Quantum - Abstract
A Comment on the Letter by [Sascha Gaertner et al., Phys. Rev. Lett. 100, 070504 (2008)]. The authors of the Letter offer a Reply.
- Published
- 2008
- Full Text
- View/download PDF
47. Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol
- Author
-
Fei Gao, Su-Juan Qin, Fu-Chen Zhu, and Qiao-Yan Wen
- Subjects
Physics ,Quantum Physics ,Theoretical computer science ,FOS: Physical sciences ,Quantum capacity ,Quantum channel ,Quantum key distribution ,Atomic and Molecular Physics, and Optics ,law.invention ,Quantum cryptography ,law ,Quantum error correction ,Quantum mechanics ,Quantum information ,Quantum Physics (quant-ph) ,Cryptanalysis ,Quantum information science - Abstract
The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59 1829 (1999)] as an example. By distinguishing between two mixed states, we derive the necessary and sufficient conditions under which a dishonest participant can attain all the information without introducing any error, which shows that the HBB protocol is insecure against dishonest participants. It is easy to verify that the attack scheme of Karlsson, Koashi, and Imoto [Phys. Rev. A 59, 162 (1999)] is a special example of our results. To demonstrate our results further, we construct an explicit attack scheme according to the necessary and sufficient conditions. Our work completes the security analysis of the HBB protocol, and the method presented may be useful for the analysis of other similar protocols., Revtex, 7 pages, 3 figures; Introduction modified
- Published
- 2008
48. Consistency of shared reference frames should be reexamined
- Author
-
Fei Gao, Qiao-Yan Wen, Fu-Chen Zhu, and Fen-Zhuo Guo
- Subjects
Physics ,Quantum Physics ,Quantum cryptography ,Consistency (statistics) ,Quantum mechanics ,FOS: Physical sciences ,Point (geometry) ,Data_CODINGANDINFORMATIONTHEORY ,Quantum Physics (quant-ph) ,Quantum information science ,Algorithm ,Atomic and Molecular Physics, and Optics ,Reference frame - Abstract
In a recent Letter [G. Chiribella et al., Phys. Rev. Lett. 98, 120501 (2007)], four protocols were proposed to secretly transmit a reference frame. Here We point out that in these protocols an eavesdropper can change the transmitted reference frame without being detected, which means the consistency of the shared reference frames should be reexamined. The way to check the above consistency is discussed. It is shown that this problem is quite different from that in previous protocols of quantum cryptography., 3 pages, 1 figure, comments are welcome
- Published
- 2008
- Full Text
- View/download PDF
49. Quantum asymmetric cryptography with symmetric keys
- Author
-
Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu, and Fei Gao
- Subjects
Scheme (programming language) ,Quantum Physics ,business.industry ,Computer science ,TheoryofComputation_GENERAL ,FOS: Physical sciences ,Cryptography ,Construct (python library) ,Topology ,Public-key cryptography ,Symmetric-key algorithm ,Quantum cryptography ,business ,Quantum Physics (quant-ph) ,Quantum ,computer ,computer.programming_language ,Computer Science::Cryptography and Security - Abstract
Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore, the state-estimation attack to a prior QPKC scheme is demonstrated., Comment: 8 pages, 1 figure, Revtex4
- Published
- 2008
- Full Text
- View/download PDF
50. Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication
- Author
-
Fen-Zhuo Guo, Fei Gao, Qiao-Yan Wen, and Fu-Chen Zhu
- Subjects
Quantum Physics ,Point (typography) ,business.industry ,Computer science ,Perspective (graphical) ,FOS: Physical sciences ,Cryptography ,Computer security ,computer.software_genre ,Information theory ,Secure communication ,business ,Quantum Physics (quant-ph) ,Quantum ,computer ,Protocol (object-oriented programming) - Abstract
From the perspective of information theory and cryptography, we analyze the security of two quantum dialogue protocols and a bidirectional quantum secure direct communication (QSDC) protocol, and point out that the transmitted information would be partly leaked out in them. That is, any eavesdropper can elicit some information about the secrets from the public annunciations of the legal users. This phenomenon should have been strictly forbidden in a quantum secure communication. In fact, this problem exists in quite a few recent proposals and, therefore, it deserves more research attention in the following related study., Comment: An authors' note was added. That is, when this study was completed, we found that the insecurity of quantum dialogue was independently pointed out by Tan and Cai (see arXiv:0802.0358)
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.